Armenia probes alleged sale of 8 million government records on hacker forum

Hackers are offering for sale what they claim is a large trove of Armenian government-related data, prompting officials in Yerevan to open an investigation into a potential breach.

The alleged seller, using the alias dk0m, said it gained access to a government notification system used to distribute official communications, including legal and administrative notices.

The dataset, advertised on an underground forum for $2,500, is said to contain about 8 million records linked to official notifications, including communications from police and judicial bodies.

In a statement on Saturday, the Public Relations and Information Center of Armenia (PRIC) — a government-linked strategic communications body — denied that the country’s government email infrastructure had been breached, but said attackers may have accessed data from another state platform.

“A preliminary review suggests that the leaked files were obtained from the electronic civil litigation platform,” PRIC said, adding that an internal probe is under way to confirm the source of the data and how it was accessed.

Cybersecurity researchers at CyberHUB-AM, a non-governmental group focused on digital security, said dk0m is a known broker on underground cybercrime forums, with a history of selling government-related data dating back to at least 2024.

According to the researchers, the actor typically relies on infostealer malware — tools designed to harvest saved credentials and session cookies from infected devices — to identify access to sensitive government portals before packaging and reselling the data.

They noted that dk0m has previously advertised data linked to ministries in countries including Argentina, Ukraine and Brazil, often sharing samples or database structures to bolster credibility.

Screenshots dating back to August 2024 suggest the actor may already have possessed Armenian government-related data, raising the possibility that the latest offer is an attempt to monetize material obtained earlier, the group said.

If the dataset is authentic, researchers warned it could expose Armenian citizens to heightened cyber risks.

“Official-looking data tied to courts, enforcement services or police structures significantly lowers the barrier for social engineering attacks,” CyberHUB-AM said.

“Citizens could be targeted with highly convincing scam messages referencing real case numbers, fines or enforcement actions, increasing the likelihood of panic-driven responses or compliance.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Next Post

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Related Posts

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new announcement now triggers a global race
Read More

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive network. The router hijacking activity has been codenamed Operation WrtHug by SecurityScorecard's STRIKE team. Southeast Asia and European countries are some of the other regions where infections have
Read More